I’m just back from RSA Europe 2008, where I was hosting a panel on software as a service (SaaS) in general, security as a service in particular, and dealing with the security risks of both. I don’t know what the feedback will be like from the audience, but it was one of the most animated panels I have had the pleasure to host.
The big and very blatant caveat, was that all of the panellists had some vested interest in the topic, as they were all SaaS providers. We had:
Indeed, this was no accident – as we put together the programme for RSA Europe, we took note of the number of people who wanted to talk on this topic and their rationale, and agreed: “Wouldn’t it be best to invite them as a panel?” And so, we did – to great effect as each looked to differentiate themselves from the others in the face of an oft-skeptical audience.
Against this background, one section interested me in particular. Having worked through the general benefits of SaaS, the back-and-forth of responses to questions such as, “Isn’t it just hosting in the Internet age?” and other such pleasantries, the panellists worked through what security as a service brought to the party. I summarise, paraphrase and otherwise pillage the responses to yield the following:
So – are these valid criteria? Our own view from the ground tends to be coloured by projects such as IT on the Front Foot, where our research suggests that forward-thinking organisations are more likely to look to external sources of services, whether outsourced, SaaS or whatever. So – nothing against the model in principle, as long as it is seen as a new delivery mechanism for many vendors (which is perfectly valid), rather than as a whole new-and-improved way of doing things for customers (many of whom have been drawing services from external sources for many years. From this point of view, the above list can make sense – but with a final caveat: that it is well worth looking at SaaS in the cold light of what you are trying to achieve, rather than what vendors are trying to do.